top of page
Image by Jefferson Santos

Cybersecurity starts with you.

Secure yourself before you secure your company.

Program Details

Program
Choose your track

The programs are in alignment with the National Education Policy (NEP)

(Link: https://www.education.gov.in/sites/upload_files/mhrd/files/NEP_Final_English_0.pdf)

Program Duration (as per UGC norms)
Program Dates

Prerequisite Semester
Classes commence every June

 

Audit & PG-Diploma Programs

  • Odd Semester - January to May

  • Even Semester - August to December

Masters Program
Classes commence every January (6th Jan, 2024)

Schedule
Program Schedule Cybersecurity Engineering PES University
Course Pedagogy

The program will be instructor-led classes and it will be supplemented with Videos, Quizzes, Assignments, Hands-on Practical Labs, and Capstone Projects with Real-world Case Studies.

Course Pedagogy | Cybersecurity Engineering

Evaluation:

50% Weightage for Internal Assessment - Quizzes, Assignments, Labs and Projects

50% Weightage for Final Examination

Please note: Evaluation metrics will vary with the course.

Curriculum
Prerequisite Semester (for non-engineering candidates only)
  1. Data Structure and Algorithm Using C (4 credits)
     

  2. Operating Systems, System Programming and Bash Scripting (4 credits)
     

  3. Computer Networks (4 credits)
     

  4. Web Technologies (4 credits)
     

  5. Python Programming (4 credits)

Semester 1 (Jan to May | 12 Credits)
  1. Cybersecurity Essentials​

    • This introductory course revisits concepts of OS, Scripting, Networking, and programming essentials
       

  2. Network Security

    • This course deals with various aspects of Network security – Wired and Wireless; packet capture, security issues in various network protocols like TCP, DNS etc.
       

  3. Software Security

    • ​This course explores various aspects of software vulnerabilities like Buffer overflows, Malware and Application security

Semester 2 (Aug to Dec | 12 Credits)
  1. Topics in Cryptography

    • Understand the evolution from classical to modern cryptography; Learn about the underlying mathematical foundations and the concepts of Symmetric, Asymmetric cryptography, Hash, and related topics
       

  2. Applied Cryptography

    • Learn about the application of various Crypto techniques and tools in modern day applications – Data Encryption, TLS, Digital Signature, Non-repudiation, Email Security etc.
       

  3. Block Chain and Applications

    • Learn fundamentals of blockchain technology and its architecture. Understand the attributes of Blockchain like immutability, Merkel trees and consensus algorithms with real world application use cases in Supply chain, food source, fintech and reality

Semester 3 (Jan to May | 12 Credits)
  1. Digital Forensics 1

    • Introduces the history and evolution of Digital forensics, principles of Digital Forensics and its challenges. Students also learn about Computer memory and file forensics and practice with applicable tools. Understand Incidence response types, Industry standards and reporting.
       

  2. Digital Forensics 2

    • Learn about digital investigative techniques and challenges

    • Learn to effectively acquire forensic data from various digital devices such as desktops, portables, Network and Cloud
       

  3. Cyber Law and Data Privacy

    • Understand Privacy needs as per GDPR, California Privacy act, and Indian laws

    • Focuses on many compliance issues under information security and privacy mandates such as GDPR, HIPAA, FISMA, GLBA, and PCI-DSS

    • Develop the appropriate vocabulary for better legal results in policies, contracts, and incidents

Semester 4 (Aug to Dec | 12 Credits)
  1. Cloud Security

    • More than ever, businesses are moving sensitive data and shifting mission-critical workloads to the cloud – typically a multicloud platform, including Amazon Web Services, Azure, Google Cloud, and others

    • Understand and identify the risks and risk controls based on the deployment models – IaaS, PaaS, and SaaS

    • Evaluate the trustworthiness of service providers based on their security documentation, service features, third-party attestations, and position in the global cloud ecosystem

    • Articulate the business and security implications of a multicloud strategy applying CIS controls
       

  2. ​Applied Data Science & Artificial Intelligence for Cybersecurity​

    • Students explore the intersection of Cybersecurity, Data Science and Artificial Intelligence and apply DS and AI/ML techniques to enhance Security solutions
       

  3. Ethical hacking and Exploit Development

    • Learn penetration testing using repeatable frameworks like OWASP and tools like ZAP and Burp suite, NMap, Nessus, Kali, Metaspoilt etc.

    • Apply the learnings to perform penetration testing on live sites and find vulnerabilities

    • Write exploits​

Semester 5 (Jan to May | 20 Credits)

Capstone Project
In this semester students will do an individual capstone project. Students can pick a project of their choice from their work place or from the ISFCR center.  Continuous guidance is provided along with periodic assessment.

 

The capstone project is an opportunity to apply all your learnings to solve real problems.

Admission Details

Admission
Eligibility Criteria for PG-Diploma & Masters
  1. Graduation in BE/B.Tech/M.Sc (Mathematics)/MCA from a recognized university, and at least 50% in the undergraduate degree.
    Note: Candidates with a non-engineering background (bachelor's degree in science, commerce, arts and equivalent with 50% and above) are required to attend a prerequisite semester before the commencement of the Masters/PG Diploma program

    AND
     

  2. Candidates need to have a minimum work experience of 24 months by the time of commencement of the program

Admission is subject to clearing an interview with the University panel. The interview will evaluate the candidate's understanding of the relevant concepts of Computer Science.

Note: Candidates shall submit the documents regarding graduation, transcripts and work experience for verification to the admissions office. Candidates will have to submit pay-slip, experience certificate, and Form 16 filing as proof of the work experience. If the candidate is unable to produce documents meeting the eligibility criteria, the admission process will not progress. Selected candidates will receive a letter of offer for admission from the University.​​

Eligibility Criteria for Audit

Learners interested in knowing more about cybersecurity can enroll for this program.​

Method of Admission

Candidate to register for PESSAT on www.pessat.com and take a personal interview

Admissions Deadline

Apply before 2nd January 2024 for the Masters Program - January Intake
Classes commence on 6th January 2024

All admissions on first-come-first-serve basis subject to fulfilment of eligibility and selection criteria

Fees Details

Prerequisite Semester Program Fees (For non-engineering candidates)

₹1,00,000

Masters Program Fees
₹6,00,000

(₹1,50,000 per semester, 4 instalments)

PG-Diploma Program Fees
₹1,50,000 per semester

Audit Semester Program Fees

₹1,50,000 per semester

Scholarships

  • All PESU alumni are eligible for scholarships

  • Scholarships available for other deserving students

The university will provide all necessary documents for the candidates to procure educational loans

Program Faculty

Instructors
Prof. Prasad Honnavalli
Prasad B Honnavalli

Professor, Computer Science and Engineering

GISF Certified, GIAC Advisory Board

Director, PESU C-ISFCR

Director, PESU C-IoT

Founder, abhayasecure.com

Leads the Teaching, Research, Executive Education, Industry partnership and Consultancy in his areas of focus - Cybersecurity and Internet of Things.

Other faculty members who will be delivering the program
Adjunct Faculty
raj passport photo.jpg
Raj Gopalakrishna

Adjunct Faculty Member, PES University
Co-Founder & Chief Product Architect, Acalvio Technologies

Raj wears multiple hats – he is an Entrepreneur, Inventor, Technologist, and thought leader.

At Acalvio, Raj is leading the efforts to build the nextgen Advanced Threat Detection using deception techniques to quickly and accurately detect true positive cybersecurity events and delay malicious attackers access to valuable assets with prioritized hunting and proactive remediation efforts.


Previously, Raj was a Distinguished Engineer and SVP at CA Technologies.

WhatsApp Image 2022-06-13 at 12.01.28 PM.jpeg
K S Shashank

Adjunct Faculty Member, PES University
Senior Security Analyst at Elastic

 

Shashank brings several years of hands-on security experience with tools and services for the Cloud - infrastructure, Orchestration, Storage and applications; with a focus on reducing Cyber Risk by early detection and response to Cyber security incidents and threats.

unnamed-5.png
Ramakant Mohapatra

Adjunct Faculty Member, PES University

He is a leader in Data Privacy and Data Protection with over two decades of experience in the Data Privacy and Information Security domain with a track record of developing privacy strategies, policies, frameworks, planning, implementing, governing and maintaining Privacy programs with defined KPIs to enable business growth while managing privacy risks for large and small enterprises.

The courses will be delivered by experienced faculty from PESU C-ISFCR and augumented by faculty from the industry.

The center aims to provide students with conceptual learning, experiential training and hands-on skilling for engineers and non-engineers, needed by industry for technical and managerial roles.

C-ISFCR by the numbers

23

courses

26

faculty members

3000+

students

72+

publications

Program Highlights

Program Highlights

Presenting an integrated entrepreneurship opportunity in cybersecurity!

Signing up for PES University M.Tech in Cybersecurity Engineering can get you more than just the MTech degree, it can help you own a potential unicorn in cybersecurity. 

You can build your own cyber security startup as part of your course by leveraging Pesu Venture Labs (PVL), our in-house venture studio & start-up fund.

Bring your own Cybersecurity idea or choose from our curated list of ideas. Leverage resources, funding & support available from PESU Venture Labs (PVL) for converting the idea to a product & build a business. PESU Venture Labs (PVL) will handhold you in your journey.

If you have a great idea around Cybersecurity, this is the great way to build your startup while you continue to pursue your masters!

Job Outlook and Future

Mainstream and professional media highlight almost on a daily basis, the ever-growing issues and concerns around data breaches, data integrity and privacy and other aspects of cyber security. One of the reasons is because demand for cyber professional far outstrips the supply. This is true in India and across the globe.  Several Industry and recruitment agencies have estimated the supply-demand gap to be in the order of millions of jobs. Importantly, cybersecurity skills and knowledge are globally applicable.

Source: https://www.bls.gov/opub/btn/volume-10/why-computer-occupations-are-behind-strong-stem-employment-growth.htm

Image by Kelly Sikkema
Choose your program

Choose your track to explore and learn cybersecurity,

an Audit, PG-Diploma or a Masters degree.

Programming_edited.jpg
Cybersecurity starts
with you

Futureproof your career. Build a security mindset. Secure yourself before you secure your company.

Image by Sigmund
Use what you learn today, in the industry tomorrow 

Each course aims to cover core concepts and their practical applications augmented with numerous hands-on laboratory work and short format projects using relevant tools and framework. Tackle real-world problems.

IMG_2126.heic
Comprehensive Curriculum

The curriculum is contemporary and is a unique blend of conceptual and Hands on learning.

 

This learning can be immediately applied to real problems on the job.

Image by Kelly Sikkema
Dedicated Learning Management System

An in-house, custom-built Learning Management System (LMS) will be deployed to effectively manage the learning and outcome measurement of our students – giving us an edge to ensure and track progress along with giving the students the ability to learn in a hybrid model, enabling both online and offline learning.

Image by Kelly Sikkema
Scholarships

All PESU alumni are eligible for scholarships. Scholarships are also available for other deserving students

person using black laptop computer_edite
Cybersecurity for everyone

Now, engineers and non-engineers can take up a career in cybersecurity and master the skills required by the industry.

IMG_3345.JPG
Upskill, while working

Earn a Master's degree in Cybersecurity Engineering, while still working. There is a large demand for cybersecurity professionals all across the globe.

Image by Kelly Sikkema
Highly qualified faculty with industry experience

Faculty who have the right blend of academic and industry experience in addition to having relevant industry leading certifications like SANS, COMPTIA, EC-Council and CISSP

Image by Kelly Sikkema
Access to Resources

Full access to the University Library at all times along with its various electronic databases and resources.

Image by Kelly Sikkema
Career Assistance and Support

Resume Builder: Professional help from the centralised placement cell of the University to help each student to develop a professional resume.

Placements: Placements has always been the USP of PES University since long. Professional placement assistance will be provided from the centralised placement cell of the University.

Image by Kelly Sikkema
Small Class Size

20 students per batch leading to highly personalized attention.

A uniquely programmed one to one mentorship for every student designed to help them discover their true potential.

noun-users-943303-FFFFFF.png

What our students say

Testimonials

Hello, I'm Suresh with a background in telecom, and I'm completely new to cybersecurity. Entering the cybersecurity field felt like an uphill battle, but after extensive research, I discovered the PES EXE MTech in cybersecurity. I want to express my gratitude to the entire PES team for structuring this course to cater to working professionals like me who are also new to cybersecurity.

The course covers everything, starting with  the fundamentals of cybersecurity, network security, and software security basics. It gradually progresses to advanced topics such as identifying cybersecurity threats, cryptography, blockchain, digital forensics, and even Ethical Hacking.

What sets this course apart is the hands-on experience provided through lab practical’s, which is not commonly found in other programs . The faculty is good, comprising certified professionals and industry experts who share their valuable insights.

The labs are designed to align with industry standards, ensuring that we gain practical skills that are in demand in the market. If there are any updates or enhancements in the field, the course curriculum is adjusted accordingly.

This comprehensive course has covered all the latest technologies in cybersecurity.

Suresh R
Software Development Manager

The field of Information Security is constantly evolving and there is much to research and learn for security professionals. Learning is sometimes ad-hoc and unstructured. I was looking for a structured approach to study, learning from experts and provide me with respected credentials which will serve as a platform to advance and progress in my career.

I chose PES after careful evaluation and measured consideration, by comparing with other institutes across India. What appealed to me most importantly, was the syllabus. I found it to be contemporary, relevant and useful for working professionals. All subjects and topics were focused purely on security, while also keeping it relevant to industry trends and standards. The scheme of study provides good flexibility to working professionals in attending lectures, while the timely and regular internal assessments provide motivation for students to study manageable portions on a daily basis. The case studies discussion is especially engaging and offer insights into analysing security events, while also promoting healthy discussions amongst the students to express their views and share their experiences. The labs are intensive and raise the standards of the program, while also igniting a technical mindset within the students. The faculty are highly accomplished and have good overall blend of both academia and industry.

To summarise, the Executive M.Tech program at PES is definitely of top-notch quality. I would strongly recommend this as a program for professionals to pursue, in order to enhance their knowledge and advance in their career.

Arjun BM
Chief Security Architect at a leading global FinTech company
17+ years of experience

The field of Information Security is constantly evolving and there is much to research and learn for security professionals. Learning is sometimes ad-hoc and unstructured. I was looking for a structured approach to study, learning from experts and provide me with respected credentials which will serve as a platform to advance and progress in my career.

Screenshot 2022-06-29 at 4.49.10 PM.png
Ashish Nandan
Python Developer | Alif Semiconductor
gallery-2.png

Gallery

Virtual Campus Tour

Note: Contact hours will be in PESU RR Campus only.

FAQs

FAQs

Why Executive Education at PES University?

PES University is one of the country’s leading teaching and research-driven universities. With state of the art infrastructure and world class facilities, the university is committed to providing “Navigation for the Real World” that inspires students to realize their potential.

In today’s competitive and knowledge-based economy, there is a premium for people with right skills and knowledge. Most people, particularly in the technology space feel the need to update their knowledge or upgrade their skills or acquire new certification and skills that are aligned with needs of the evolving job market.

India is at the forefront of technological innovation and the quick adoption of new-age technologies.  Cloud-first and mobile-first strategy is driving the digital transformation of businesses in India and across the world, impacting their cyber risk profile and posture.


The growing usage of social media, smartphones, and tablets has made it simple and affordable to have a digital presence without fully understanding the risk of data breaches and hacking. The need for governments and other organisations to safeguard sensitive data gathered from citizens and make sure that it is neither stolen nor altered by malicious attackers is constantly expanding.

 

Technologies such as Cloud, Big Data, analytics, Machine Learning, Artificial Intelligence, and the Internet of Things, promise to open a world of unparalleled growth opportunities along with rising the risk of confidential data being maliciously collected, stored, and disseminated. Most human resource agencies will confirm the shortage of skilled and qualified cybersecurity professionals, to defend against the ever-morphing security threats.

Why cybersecurity?

With the ever growing data, the demand for protecting it is growing leaps and bounds. Cyber security is amongst the top 10 fastest growing requirements from the industry. Earlier this year, the Harvard Business Review shared a report that summed up the plight: “The majority of chief information security officers around the world are worried about the cybersecurity skills gap, with 58 percent of CISOs believing the problem of not having an expert cyber staff will worsen.” (Source: https://hbr.org/sponsored/2019/06/the-public-private-partnership-thats-working-to-make-new-york-city-a-global-hub-of-cybersecurity-talent)

In fact, recent research by ISACA report* shows ongoing difficulties finding and keeping experienced cybersecurity professionals:

  • 62% of respondents claim that their cybersecurity team is understaffed

  • 32% claim that it takes longer than six months to find a suitable candidate with hands-on cybersecurity expertise

  • 66% claim that it is challenging to keep cybersecurity talent

(*Report: https://www.isaca.org/why-isaca/about-us/newsroom/press-releases/2022/state-of-the-cybersecurity-workforce-new-isaca-research-shows-retention-difficulties-in-years)
 

There is a need to address talent problems at an academic and industry level. The technological curriculum should focus on providing experiential learning, conceptual training, and hands-on skilling for engineers and non-engineers to match the ever-evolving needs of the industry for technical and managerial roles.

Who is this program ideal for?

This program is for professionals who want to develop a career in cybersecurity or looking for a change in career path to cybersecurity. It is also for those who are already in this field, but want to develop a strong foundation of concepts and desire exposure to current tools and hands on learning.

Now, engineers and non-engineers, both, can choose a track (Audit Program or PG-Diploma Program or Masters Program) of their preference and learn cybersecurity at their pace.

What are the program outcomes?

Participants will gain a solid exposure to the current threat landscape and how to manage cyber security risks. The conceptual underpinning and hands on exposure will prepare them to deal with emergent and future cyber threats successfully and enhance the security posture of their organisations.

Who will deliver the program?

Experienced professors from the PESU Center for Information Security, Forensics and Cyber Resilience (PESU C-ISFCR) and the Department of Computer Science and Engineering will deliver the program. Classroom sessions will be augmented by lectures from industry professionals.

Can students change programs and how?

  • Candidates who have taken up the Audit Program can upgrade to a PG-Diploma Program/Masters Program if they meet the eligibility requirements. Candidates from non-engineering backgrounds need to take up the prerequisite semester before starting the PG-Diploma Program/Masters Program.

  • Candidates who have taken up the PG-Diploma Program can get the Masters Degree if the candidate finishes all the semesters, completes the assessments & evaluations and submits the Capstone Project.

Contact Us

Contact Us
Interested in the program?
bottom of page